0 of 10 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Security is only the responsibility of the Chief Security Officer.
The information security triad is based on which three security objectives:
Personally identifiable information is that which can be used to distinguish or trace an individual’s identity.
Which information classification is the most limited and should only be shared on a need-to-know basis?
It is acceptable to share your password with someone from IT.
Which of the following is an example of a strong password?
MFA authentication factors typically include which of the following?
Social engineering is defined as the art of manipulation through which human behavior is exploited to gain unauthorized access to systems and confidential information.
How do you report suspicions and security incidents?
Protecting yourself to protect all of us requires that you educate yourself by completing required training and familiarizing yourself with company policies.